Guide to computer forensics and investigations / (Record no. 6414)

MARC details
000 -LEADER
fixed length control field 01838cam a22002777i 4500
003 - CONTROL NUMBER IDENTIFIER
control field OSt
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20240115090805.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 180228s2019 maua b 001 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781337568944
Qualifying information paperback
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1337568945
Qualifying information paperback
040 ## - CATALOGING SOURCE
Original cataloging agency BUL
Transcribing agency BUL
Modifying agency BUL
Language of cataloging eng
Description conventions rda
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 23
Item number NEL
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Nelson, Bill,
Relator term author.
245 10 - TITLE STATEMENT
Title Guide to computer forensics and investigations /
Statement of responsibility, etc. Bill Nelson, Amelia Phillips, and Chris Steuart.
250 ## - EDITION STATEMENT
Edition statement 6th edition.
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. Boston, MA :
Name of publisher, distributor, etc. Cengage,
Date of publication, distribution, etc. ©2019
300 ## - PHYSICAL DESCRIPTION
Extent xxx, 738 p. :
Other physical details ill. (some col) ;
Dimensions 24 cm
500 ## - GENERAL NOTE
General note CONTENTS<br/><br/><br/>Chapter 1. Understanding the digital forensics profession and investigations<br/><br/>Chapter 2. The investigator's office and laboratory<br/><br/>Chapter 3 Data acquisition <br/><br/>Chapter 4. Processing crime and incident scenes<br/><br/>Chapter 5.Working with windows and CLI systems <br/><br/>Chapter 6. Current digital forensic tools<br/><br/>Chapter 7.Linux and Macintosh file systems<br/><br/>Chapter 8. Recovering graphics files<br/><br/>Chapter 9. Digital forensics analysis and evaluation<br/><br/>Chapter 10. Virtual machine forensic, live acquisitions, and network<br/><br/>Chapter 11. E-mail and social media investigations<br/><br/>Chapter 12. Mobile device forensics and the internet of anything<br/><br/>Chapter 13. Cloud forensics<br/><br/>Chapter 14. Report writing for high-tech investigations<br/><br/>Chapter 15. Expert testimony in digital investigations<br/><br/>Chapter 16. Certification test references<br/><br/>
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes bibliographical references (pages 685-690) and index P. 721-738
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer crimes
General subdivision Investigation.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer security.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Phillips, Amelia,
Relator term author.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Steuart, Christopher,
Relator term author.
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type Book Closed Access
Edition 6th edition.
Classification part 005.8
Item part 1
Call number prefix NEL
Call number suffix 005.8 NEL
Source of classification or shelving scheme Dewey Decimal Classification
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Home library Current library Date acquired Source of acquisition Inventory number Total Checkouts Full call number Barcode Date last seen Copy number Price effective from Koha item type
    Dewey Decimal Classification     Engineering Library Engineering Library 09/23/2021 Purchase 0027637   005.8 NEL 1 BUML24010410 09/23/2021 1 09/23/2021 Book Closed Access